Corporate Information Security Vs Government Legislation: Who Is to Blame For Data Breaches?

June 19, 2018 | Devin Morrissey
June 19, 2018 | Devin Morrissey

Corporate Information Security Vs Government Legislation: Who Is to Blame For Data Breaches?

Data breaches have become a hot button topic in recent years. From the ransomware attack that breached the National Health Service in the U.K. to the disastrous Equifax breach that just keeps going, major corporations and government entities are discovering that no one is immune to cyber attack.Where, in the end, does the buck stop? Is there an…

June 18, 2018 | Innovate UK

Cyber Security Awareness Tips for Businesses

We’ve all heard of cyber crime and the need to protect ourselves from it. But, what impact does it actually have on businesses?What you may not know is that cyber crime is costing UK businesses around £30 billion a year, and this figure is rising. Many businesses have had to close as a result!But, there are…

Get the latest security news in your inbox.

Subscribe via Email

June 15, 2018 | Javvad Malik

Things I Hearted this Week, 15th June 2018

Fear not, after a week without update because I was busy galavanting around at Infosecurity Europe and picking up awards, regular service has been resumed.Empathy in Incidence ResponseHis email message to the SOC was succinct. “I clicked on a suspicious link,” he wrote, “What do I do now?”My first reaction wasn’t…

June 14, 2018 | Devon Taylor

Secure by Design: The Network

Secure by design is about designing secure environments with real constraints in mind. I state the assumptions used in this post up front because they are going to give context to my security and design advice.The following assumptions are made about your business and team:IT is a skeleton crew and you do not have dedicated security personnel. IT…

June 13, 2018 | Jane Thomson

Want to be a Data Scientist? 4 Things You Must Know

In the current age of digitization, data is the most trending and upcoming corporate currency across the length and breadth of the digital market. Data science is the most flourishing sector with a variety of fresh new roles and skill-sets which are in popular demand. For this reason, there is an increasing demand for data scientists across the globe. Candidates…

June 12, 2018 | Javvad Malik

Infosecurity 2018 Recap!

The London weather was uncharacteristically pleasant for the whole week which saw it play host to many visitors around the world who descended for Infosec 2018 in Olympia.As usual, the event was lively, with a seemingly endless line of attendees walking the hall, and attending sessions.In my view, the sign of a good conference is how many people it…

June 11, 2018 | Bob Covello

A Step Toward a Better Cyber Workforce

Do you believe that we have a severe shortage, or are you on the side that argues that there are plenty of qualified workers and it is the hiring managers who don’t understand their own position descriptions?Do you believe that certifications are the path to a prepared cyber workforce, or are you one who relies on more…

June 11, 2018 | Chris Doman

More Details on an ActiveX Vulnerability Recently Used to Target Users in South Korea

Written By Chris Doman and Jaime BlascoIntroductionRecently, an ActiveX zero-day was discovered on the website of a South Korea think tank that focuses on national security. Whilst ActiveX controls are disabled on most systems, they are still enabled on most South Korean machines due to mandates by the South Korean government.…

June 8, 2018 | Brett Blackman

Electronic Health Records: Weighing the Pros and Cons

There are few industries more reliant on technology than healthcare. At the same time, few industries require the same amount of regulation and security, as improper care or the misuse of patient information could have potentially life-threatening consequences, not to mention a high risk of malpractice and fraud. This paradox has put providers in a bit of a pickle, especially…

Cyber Insurance is the Last, not First Step in Risk Mitigation

In the world of risk…specifically risk mitigation, cyber insurance is the last chapter in your cybersecurity playbook.  Let me explain:  The goal of any security plan is to mitigate (stop or reduce) threats as much as possible.  In a network, that means layered tools (firewall, anti-virus, backups), etc., along with policies, user education and other…

June 6, 2018 | Mike LaPeters

5 Steps to Making the Business Transformation to an MSSP

One of the perks of my job is the opportunity to speak with a diverse community of channel partners including Managed Security Service Providers (MSSPs). Invariably, we end up talking about customer opportunities, open issues, marketing events or product roadmaps. Occasionally, I have these exceptional discussions about the opportunities and challenges they face today, how they react and respond to…

June 5, 2018 | Holly Barker

Infosecurity London 2018

Are you planning to come to Infosecurity Europe June 5th-7th in London? If so, stop by and see us at our stand #L60! If not, no worries just tune into Twitter, LinkedIn or Facebook as we will be providing updates throughout the show.  Just look for the large lunar module in the middle of our booth, and fun…

Watch a Demo ›